Vulnerability Description
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xinruidz | Sundray Wan Controller Firmware | <= 3.7.4.2 |
| Xinruidz | Sundray Wan Controller | - |
Related Weaknesses (CWE)
References
- http://www.cnvd.org.cn/flaw/show/CNVD-2019-07679Third Party Advisory
- http://www.cnvd.org.cn/flaw/show/CNVD-2019-07679Third Party Advisory
FAQ
What is CVE-2019-9161?
CVE-2019-9161 is a vulnerability with a CVSS score of 9.8 (CRITICAL). WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in...
How severe is CVE-2019-9161?
CVE-2019-9161 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-9161?
Check the references section above for vendor advisories and patch information. Affected products include: Xinruidz Sundray Wan Controller Firmware, Xinruidz Sundray Wan Controller.